Page Expire Popup/Redirection for WordPress Security & Risk Analysis

wordpress.org/plugins/page-expire-popup

Welcome to the Page Expire Popup An Awesome and Urgency Page Expire Popup or Redirect for WordPress.

10 active installs v1.1 PHP 7.0+ WP 5.6+ Updated Dec 26, 2025
exit-popupexpire-popuppage-expirepageexpirepopuppopup
99
A · Safe
CVEs total1
Unpatched0
Last CVEJan 5, 2026
Safety Verdict

Is Page Expire Popup/Redirection for WordPress Safe to Use in 2026?

Generally Safe

Score 99/100

Page Expire Popup/Redirection for WordPress has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.

1 known CVELast CVE: Jan 5, 2026Updated 4mo ago
Risk Assessment

The 'page-expire-popup' plugin v1.1 exhibits a mixed security posture. While it avoids dangerous functions, file operations, and external HTTP requests, and includes some nonces, several concerning indicators are present. The presence of 3 AJAX handlers, with one lacking authentication checks, significantly expands the attack surface. This unprotected entry point, coupled with 50% of SQL queries not using prepared statements and only 45% of output being properly escaped, suggests a heightened risk of vulnerabilities. The taint analysis revealing a flow with unsanitized paths further exacerbates these concerns.

The vulnerability history indicates a past medium-severity SQL injection vulnerability. The fact that there are no currently unpatched vulnerabilities is a positive sign, but the pattern of past SQL injection issues, combined with the current code analysis findings (raw SQL, unsanitized paths), suggests a recurring weakness in input sanitization and SQL query handling. While the plugin has strengths in avoiding certain risky practices, the identified unprotected AJAX handler and code-level issues necessitate careful consideration of its security.

Key Concerns

  • Unprotected AJAX handler
  • SQL queries not prepared
  • Improper output escaping
  • Taint flow with unsanitized path
  • Past medium SQL injection vulnerability
Vulnerabilities
1 published

Page Expire Popup/Redirection for WordPress Security Vulnerabilities

CVEs by Year

1 CVE in 2026
2026
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-14153medium · 6.5Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Page Expire Popup/Redirection for WordPress <= 1.0 - Authenticated (Author+) SQL Injection via 'id' Shortcode Attribute

Jan 5, 2026 Patched in 1.1 (1d)
Version History

Page Expire Popup/Redirection for WordPress Release Timeline

v1.1.0
v1.0.01 CVE
Code Analysis
Analyzed Mar 17, 2026

Page Expire Popup/Redirection for WordPress Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
2 prepared
Unescaped Output
42
35 escaped
Nonce Checks
2
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

50% prepared4 total queries

Output Escaping

45% escaped77 total outputs
Data Flows · Security
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<vfpepstructure> (inc\vfpepstructure.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

Page Expire Popup/Redirection for WordPress Attack Surface

Entry Points4
Unprotected1

AJAX Handlers 3

authwp_ajax_myvfpageexpirepopupsavepageexpirepopup.php:63
authwp_ajax_myvfpageexpirepopupupdatepageexpirepopup.php:114
authwp_ajax_myvfpageexpirepopupdeletepageexpirepopup.php:166

Shortcodes 1

[vfpep] pageexpirepopup.php:192
WordPress Hooks 4
actionwp_enqueue_scriptspageexpirepopup.php:24
actionadmin_enqueue_scriptspageexpirepopup.php:33
actionadmin_menupageexpirepopup.php:46
actioninitpageexpirepopup.php:189
Maintenance & Trust

Page Expire Popup/Redirection for WordPress Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 26, 2025
PHP min version7.0
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Page Expire Popup/Redirection for WordPress Developer Profile

Vikas Ratudi

7 plugins · 540 total installs

93
trust score
Avg Security Score
99/100
Avg Patch Time
8 days
View full developer profile
Detection Fingerprints

How We Detect Page Expire Popup/Redirection for WordPress

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/page-expire-popup/assets/css/style.css/wp-content/plugins/page-expire-popup/assets/js/custom.js
Version Parameters
page-expire-popup/assets/css/style.css?ver=page-expire-popup/assets/js/custom.js?ver=

HTML / DOM Fingerprints

Data Attributes
vfpep-nonce
JS Globals
vfpep_ajax_object
REST Endpoints
/wp-json/page-expire-popup/v1
Shortcode Output
[vfpep id=
FAQ

Frequently Asked Questions about Page Expire Popup/Redirection for WordPress